HomeVmwareCVE-2026-22719

CVE-2026-22719

HIGH
8.1CVSS
Published: 2026-02-25
Updated: 2026-03-04
AI Analysis

Description

VMware Aria Operations contains a command injection vulnerability. A malicious unauthenticated actor may exploit this issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress.  To remediate CVE-2026-22719, apply the patches listed in the 'Fixed Version' column of the ' Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 ' in VMSA-2026-0001  Workarounds for CVE-2026-22719 are documented in the 'Workarounds' column of the ' Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 ' in VMSA-2026-0001

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
network
Complexity
high
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-77

Metadata

Primary Vendor
VMWARE
Published
2/25/2026
Last Modified
3/4/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

vmware : aria_operationsvmware : cloud_foundationvmware : cloud_foundationvmware : telco_cloud_infrastructurevmware : telco_cloud_platform

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief